The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the […]
Dynamic Security Risk Management Using Bayesian Attack Graphs
Security risk assessment and mitigation are two vital processes that need to be executed to maintain a productive IT infrastructure. On one hand, models such as attack graphs and attack trees have been proposed to assess the cause-consequence relationships between various network states, while on the other hand, different decision problems have been explored to […]
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replayingrouting information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routingprotocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harshnetwork conditions. Traditional cryptographic techniques […]